[go: up one dir, main page]

CN1946912A - Method of authorization - Google Patents

Method of authorization Download PDF

Info

Publication number
CN1946912A
CN1946912A CNA2005800123246A CN200580012324A CN1946912A CN 1946912 A CN1946912 A CN 1946912A CN A2005800123246 A CNA2005800123246 A CN A2005800123246A CN 200580012324 A CN200580012324 A CN 200580012324A CN 1946912 A CN1946912 A CN 1946912A
Authority
CN
China
Prior art keywords
code
computer
central computer
radio terminal
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005800123246A
Other languages
Chinese (zh)
Other versions
CN100588814C (en
Inventor
米开尔·维尔格特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Michel Wilgate
Original Assignee
Tagmaster AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tagmaster AB filed Critical Tagmaster AB
Publication of CN1946912A publication Critical patent/CN1946912A/en
Application granted granted Critical
Publication of CN100588814C publication Critical patent/CN100588814C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

一种用于准许访问装置(2;11)例如计算机、门、车辆或用户需要访问的其它装置的方法,其包含经由一个短程无线电链路(5;13)传输一个代码。本发明的特征在于从一个中央计算机(1)经由无线电波向一个用户所拥有的无线电终端(3)传输一个访问码(ID代码),使无线电终端(3)经由所述短程无线电链路(5;13)向所述装置(2;11)传输所述ID代码,使所述装置(2;11)或在所述装置中的一个发射机单元向所述中央计算机(1)传输所述ID代码,并且使所述计算机(1)将接收的代码与计算机(1)向无线电终端(3)传输的代码相比较。

A method for granting access to a device (2; 11) such as a computer, door, vehicle or other device to which a user needs access, comprising transmitting a code via a short-range radio link (5; 13). The invention is characterized in that an access code (ID code) is transmitted from a central computer (1) via radio waves to a radio terminal (3) owned by a user, so that the radio terminal (3) passes through said short-range radio link (5 ;13) transmit said ID code to said device (2; 11), causing said device (2; 11) or a transmitter unit in said device to transmit said ID to said central computer (1) code and cause said computer (1) to compare the received code with the code transmitted by the computer (1) to the radio terminal (3).

Description

The method that is used to authorize
Technical field
The present invention relates to a kind of method of permitting visiting of being used to.
Background technology
Computer and mobile phone are used as the device of carrying out dissimilar processing and giving dissimilar signatures now.And computer is used to collect the information of different secret degree to a greater degree.Access to your password or the PIN code is logined, handle or operation information so that carry out in then can be during limited, this is normally enough.This means that it may be open to undelegated use if a terminal is logined within a period of time of back the user is monitored or stolen.
In order to prevent this point, require code or use magnetic card or the instrument of so-called " smart card " conduct evaluation.A shortcoming of this system is that the user feels this inconvenience use usually, thereby and manage to utilize shortcut usually, this has reduced level of security.
Unless use a problem of code to be that information is encrypted, otherwise can be read by eavesdropping, this may produce specific software, hardware or be assigned with so that the demand of the password that can be used by the user.
Summary of the invention
The invention solves this problem, and a kind of method that can use high security to set up user identity is provided.
Thereby, the present invention relates to a kind of access means (computer for example that is used to permit, door, other device that vehicle or user want to visit) method, it comprises via a short-range radio link and comes transmission code, and it is characterised in that from a central computer uses radio wave to the radio terminal that the user had a transmission access code (ID code), be to cause that radio terminal transmits described ID code via described short-range radio link to described device, be to cause that a described device or a transmitter unit in described device transmit described ID code to described central computer, and be to cause that described computer compares with computer the code that receives to the code that radio terminal transmits.
Description of drawings
Hereinafter, partly the embodiment of the invention shown in conjunction with the accompanying drawings will be described the present invention, wherein in more detail
-Fig. 1 represents to illustrate block diagram of the present invention.
The specific embodiment
Thereby the present invention pays close attention to a kind of method that is used to permit access means (for example computer, door, vehicle or user want other device of visiting).Hereinafter, will the present invention be described in conjunction with the example that an example of wherein wanting to visit a computer and wherein want to visit the door of a locking.Yet, the present invention can be used to be hopeful the device of permitting visiting, for example vehicle, phone etc.
This method comprises via a short-range radio link, to ID code of described device transmission.
According to the present invention, transmit access codes (ID code) via radio wave to a radio terminal that the user had 3 from a central computer 1.Radio terminal can be, for example and preferably, and a mobile phone.Yet, to use for some, it can be made of this class communication radio of for example being used by the rescue service.For radio terminal is the example of a mobile phone, is transmitted in the telephone network 8 to take place, and arrives phone via a base station 1 by radio 9.
And, cause that radio terminal 3 transmits described ID code via described short-range radio link to described device 2, as represented by arrow 5.
After this, cause described device 2; 11,12 or a transmitter unit in described device via a computer network 6,10,15, to the described ID code of described central computer 1 transmission.
Then, cause that described computer 1 compares with computer the code that receives to the code of radio terminal transmission.
Like this, generate a circuit, wherein the code of a transmission can be compared with the code of a reception.Under code situation consistent with each other, in next procedure, can cause central computer 1 to the device 2 the transmission one make the user in the way you want application apparatus become possible second code.
Because central computer is to certain mobile phone or ID code of other radio terminal transmission, the user who supposes this mobile phone is via the people of described short-range radio link to described device transmission code.As an alternative, thereby whether consistent described circuit can be used as such carrying out code registration, this thereby can be assumed to be and determine correct people that or the use of device is unwarranted just at application apparatus.
According to a first-selected embodiment, by device or the radio terminal to central computer 1 transmission code request, initialization central computer 1 is to transmit an ID code to radio terminal.For described device, request can be transmitted via computer network 10, perhaps for a mobile phone, transmits via mobile telephone network 7,8,9.
At the point of freely selecting arbitrarily, promptly in central computer 1, use mobile phone 3 or installing in 2, the described circuit of initialization, it is possible that yes.
According to the design of a first-selection, described short-range radio link is so-called known type " RFID " link.This link can be worked on both direction, use two transmitter units and two receiving elements, perhaps they can only be worked in one direction so that a request signal is launched in a unit, and this signal receives, modulates and reflection by second parts that a transponder forms.Described ID code can for example be launched by modulation by this way.
According to an alternative preferred embodiment, described short-range radio link is so-called " bluetooth " link.
Described device 2,11 and described radio terminal 3 all have an emittor/receiver unit 3,4 that is used for radio link in two examples; 12.
According to the design of a first-selection, described radio terminal is a mobile phone that comprises the part of described short-range radio link.Radio terminal is the mobile phone that integrated Bluetooth function is arranged preferably.
Thereby, in device 2,11, embed a bluetooth module.Also may use for example WLAN (WLAN) of another radiotechnics.Yet importantly irrelevant with employed technology, can produce the scope of the radio link of enough weak points, so that only trigger the device of wishing.
According to an example, described device be one need be to the computer (2) or the terminal of its visit.
In the design, the user can be via code from central computer 1 of computer 2 requests, so that can use a computer 2.This request can comprise ID number of user.Thereby code of central computer 1 transmission is given user's mobile phone 7, and it then transmits these codes via radio link 5 to computer 2.Computer 2 is to central computer 1 this code of transmission.Central computer receives the affirmation that correct code has been received by computer like this, thereby the user can use a computer in the mode of being permitted by described code.This can be the inquiry of whole or limited use, for example carries out financial transaction.
According to second example, described device be one need be to the door 11 or gateway of its visit, so that it can be opened.In the case, described device preferably comprises a sender 12 that is connected to central computer 1, and wherein sender 12 is used to use a RFID link or a Bluetooth link, communicates by letter with described radio terminal 3 via a short distance.
According to this example, this can be that to have equipped a form be rescue personnel's the inquiry of radio terminal 3 with mobile phone of integrated rfid link or Bluetooth link 13.Sender 12 also has been equipped with this link.When for example fireman wished to open, he called out central computers 1 and the transmission information about the door paid close attention to by telephone network 7,8,9.This can carry out by a digital trade mark or by another unique identity.As an alternative, phone 3 is communicated by letter with sender by described link, thereby transmits the number of mobile phones to sender 12.In the latter case, from sender 12 to central computer 1 transmission information.In these two examples, central computer 1 then transmits a code gives mobile phone, in case it has received this code, gives sender 12 with it via described link transmission, thereby can open door.
Clearly, in these two examples of computer 2 and door 11, at central computer to radio terminal 3 and to device 2; Under the situation of 11 transmission codes, code can time to time change.Make unauthorized use the difficulty more that becomes significantly over time by the eavesdropping code.
According to a first-selected embodiment, device 2; 11 can be used to the code that will receive from computer 1 and compare from the code of radio terminal 3.
According to the design of a first-selection, comprise one to the code of central computer transmission and belong to device 2; 11 the network address.This means that central computer can discern described device, and this helps not only from central computer 1 to described device transmission code, and increased the safety that the system shortsightedness unauthorized uses.
According to a design, system can be used to guarantee that for example, correct people enters a conference room.In the case, read this person's transponder by a sender that is positioned at the doorway, room, its form is RFID circuit or the Bluetooth circuit in its mobile phone.Sender is to the code of a sensing transponder of central computer transmission.Temporary designator of central computer transmission is given this person's mobile phone, and described mobile phone sends this code forward to central computer by sender.Like this, generate a circuit, wherein central computer is relevant for described temporary designator, this person's that is associated with the code that reads at first the Mobile Directory Number and the information of name thereof.
According to another first-selected embodiment, described code is used to encrypt the information that is transferred to central computer from described device.Like this, this code can comprise an encryption key.This has further increased the safety that prevention is used by the unauthorized of the code of eavesdropping and reading.
According to further first-selected embodiment, described device 2; 11 comprise a reading device 4; 12, so that read from described user's biometric data and so that cause described device 2; 11 to central computer 1 transmission biometric data.This biometric data is transferred to central computer 1, with before be kept in the central computer reference data relatively be correct people's safety so that further increase what use radio terminal or computer 2.The described reaction unit 4 that is used to read from described user's biometric data; 12 can be the reading device of an original known adequate types, for example is used to read fingerprint or eyeprint.
A large amount of designs has been described hereinbefore.Yet, obviously, can change the present invention, for example about the position of initialization and start-up circuit, also can change the quantity of the different device that constitutes described circuit.
Therefore, the present invention should not regarded as the embodiment that is subject to above explanation, because the present invention can change in the category of the claim of enclosing.

Claims (12)

1、一种用于准许访问装置(2;11)例如计算机、门、车辆或用户需要访问的其它装置的方法,包括经由一个短程无线电链路(5;13)传输代码,其特征在于从一个中央计算机(1)经由无线电波向一个用户所拥有的无线电终端(3)传输一个访问码(ID代码),使无线电终端(3)经由所述短程无线电链路(5;13)向所述装置(2;11)传输所述ID代码,使所述装置(2;11)或在所述装置中的一个发射机单元向所述中央计算机(1)传输所述ID代码,并且使所述计算机(1)将接收的代码与计算机(1)向无线电终端(3)传输的代码相比较。1. A method for granting access to a device (2; 11) such as a computer, door, vehicle or other device to which a user needs access, comprising transmitting a code via a short-range radio link (5; 13), characterized in that from a The central computer (1) transmits an access code (ID code) via radio waves to a radio terminal (3) owned by a user, enabling the radio terminal (3) to communicate with said device via said short-range radio link (5; 13) (2; 11) transmit said ID code, cause said device (2; 11) or a transmitter unit in said device to transmit said ID code to said central computer (1), and cause said computer (1) Compare the received code with the code transmitted from the computer (1) to the radio terminal (3). 2、依照权利要求1的方法,其特征在于通过所述装置(2;11)或者通过所述无线电终端(3)被引起向中央计算机(1)发送一个代码询问,引起中央计算机(1)向无线电终端(3)传输一个ID代码。2. A method according to claim 1, characterized in that by said means (2; 11) or by said radio terminal (3) being caused to send a code query to the central computer (1), causing the central computer (1) to The radio terminal (3) transmits an ID code. 3、依照权利要求1或2的方法,其特征在于所述无线电终端(3)是一个包含所述短程无线电链路(5;13)的一部分的移动电话。3. A method according to claim 1 or 2, characterized in that said radio terminal (3) is a mobile telephone comprising part of said short-range radio link (5; 13). 4、依照权利要求1、2或3的方法,其特征在于所述短程无线电链路(5;13)是“RFID”链路。4. A method according to claim 1, 2 or 3, characterized in that said short-range radio link (5; 13) is an "RFID" link. 5、依照权利要求1、2、3或4的方法,其特征在于所述短程无线电链路(5;13)是“蓝牙”链路。5. A method according to claim 1, 2, 3 or 4, characterized in that said short-range radio link (5; 13) is a "Bluetooth" link. 6、依照权利要求1、2、3、4或5的方法,其特征在于所述装置是一个想要对其访问的计算机(2)或计算机终端。6. A method according to claim 1, 2, 3, 4 or 5, characterized in that said device is a computer (2) or a computer terminal to which access is desired. 7、依照权利要求1、2、3、4或5的方法,其特征在于所述装置是一个想要对其访问以便可以将其打开的门(11)或网关。7. A method according to claim 1, 2, 3, 4 or 5, characterized in that said means is a door (11) or gateway to which access is desired so that it can be opened. 8、依照权利要求1、2、3、4、5或6的方法,其特征在于所述装置(2;11)被用于将从计算机(1)接收的代码与从无线电终端(3)接收的代码相比较。8. A method according to claim 1, 2, 3, 4, 5 or 6, characterized in that said means (2; 11) are used to compare the code received from the computer (1) with the code received from the radio terminal (3). code comparison. 9、依照权利要求7的方法,其特征在于所述装置(11)包含一个连接到中央计算机(1)的发信机(12),该发信机用于在近距离通过RFID链路或通过蓝牙链路,与所述无线电终端(3)通信。9. A method according to claim 7, characterized in that said means (11) comprise a transmitter (12) connected to the central computer (1) for short distances via an RFID link or via A bluetooth link communicates with the radio terminal (3). 10、依照权利要求1、2、3、4、5、7、8或9的方法,其特征在于从所述装置(2;11)传输到中央计算机(1)的代码包含一个属于所述装置(2;11)的网络地址。10. Method according to claim 1, 2, 3, 4, 5, 7, 8 or 9, characterized in that the code transmitted from said device (2; 11) to the central computer (1) contains a code belonging to said device The network address of (2; 11). 11、依照前述权利要求的任意一条的方法,其特征在于所述代码用于加密从所述装置(2;11)传输到中央计算机(1)的信息。11. A method according to any one of the preceding claims, characterized in that said code is used to encrypt information transmitted from said device (2; 11) to the central computer (1). 12、依照前述权利要求的任意一条的方法,其特征在于所述装置(2;11)包含一个用于读取来自所述用户的生物统计数据的读取装置(4;12),并且使所述装置(2;11)向中央计算机(1)传输生物统计数据。12. A method according to any one of the preceding claims, characterized in that said means (2; 11) comprise a reading means (4; 12) for reading biometric data from said user, and that said means (2; 11) Said means (2; 11) transmit biometric data to a central computer (1).
CN200580012324A 2004-02-24 2005-02-21 method used for authorization Expired - Fee Related CN100588814C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE0400425A SE0400425L (en) 2004-02-24 2004-02-24 Authorization procedure
SE04004255 2004-02-24

Publications (2)

Publication Number Publication Date
CN1946912A true CN1946912A (en) 2007-04-11
CN100588814C CN100588814C (en) 2010-02-10

Family

ID=31989593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200580012324A Expired - Fee Related CN100588814C (en) 2004-02-24 2005-02-21 method used for authorization

Country Status (6)

Country Link
US (1) US8466773B2 (en)
EP (1) EP1718826A1 (en)
JP (1) JP4524306B2 (en)
CN (1) CN100588814C (en)
SE (1) SE0400425L (en)
WO (1) WO2005080720A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103426215A (en) * 2012-05-21 2013-12-04 上海宽带技术及应用工程研究中心 Doorlock control method for rescue of accident and system
CN104217477A (en) * 2014-08-06 2014-12-17 玺瑞股份有限公司 Bluetooth safety system
CN110084932A (en) * 2019-04-23 2019-08-02 上海救要救信息科技有限公司 A kind of rescue mode and equipment

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060179057A1 (en) * 2005-02-07 2006-08-10 Computerized Security Systems, Inc. Security system with remote communication
US7706778B2 (en) 2005-04-05 2010-04-27 Assa Abloy Ab System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
US7607014B2 (en) 2005-06-30 2009-10-20 Hewlett-Packard Development Company, L.P. Authenticating maintenance access to an electronics unit via wireless communication
GB2432025A (en) * 2005-11-02 2007-05-09 Peter John Walden Remote access control by way of authorisation data comunicated from a users mobile phone
US8074271B2 (en) 2006-08-09 2011-12-06 Assa Abloy Ab Method and apparatus for making a decision on a card
US9985950B2 (en) 2006-08-09 2018-05-29 Assa Abloy Ab Method and apparatus for making a decision on a card
SE531723C2 (en) * 2006-12-20 2009-07-21 Phoniro Ab Access control system, lock device, management device and associated methods and computer software products
KR101368122B1 (en) * 2007-01-16 2014-02-27 삼성전자주식회사 Method for security of computer using mobile communication terminal and computer therefor
US20090066476A1 (en) * 2007-04-17 2009-03-12 Fonekey, Inc. Method of self-service access control for frequent guests of a housing facility
US8996876B2 (en) 2010-03-02 2015-03-31 Liberty Plugins, Inc. Method and system for using a smart phone for electrical vehicle charging
US8912879B2 (en) * 2010-09-23 2014-12-16 Blackberry Limited Security system providing temporary personnel access based upon near-field communication and related methods
CN103262474A (en) * 2010-11-09 2013-08-21 赞普劳科斯有限公司 Method and system for remote operation of an installation
EP2500872A1 (en) * 2011-03-08 2012-09-19 Openways Sas Secured method for controlling the opening of locking devices by means of a communication object such as a mobile phone
US20130335193A1 (en) * 2011-11-29 2013-12-19 1556053 Alberta Ltd. Electronic wireless lock
US9626859B2 (en) * 2012-04-11 2017-04-18 Digilock Asia Limited Electronic locking systems, methods, and apparatus
EP2870588A4 (en) * 2012-07-03 2015-08-05 Knock N Lock Ltd Control of operation of a lock
US9842446B2 (en) 2012-08-21 2017-12-12 Onity Inc. Systems and methods for lock access management using wireless signals
JP5640060B2 (en) * 2012-10-26 2014-12-10 京セラドキュメントソリューションズ株式会社 Confidential information management system
EP2821970B2 (en) 2013-07-05 2019-07-10 Assa Abloy Ab Access control communication device, method, computer program and computer program product
EP2821972B1 (en) 2013-07-05 2020-04-08 Assa Abloy Ab Key device and associated method, computer program and computer program product
GB2516686B (en) * 2013-07-30 2018-02-07 Paxton Access Ltd Communication method and system
SG11201602708TA (en) * 2013-10-17 2016-05-30 Wise Sec Ltd Wireless protocol message conversion device and methods of using thereof
US9443362B2 (en) 2013-10-18 2016-09-13 Assa Abloy Ab Communication and processing of credential data
CN103927809B (en) * 2014-04-30 2016-06-15 常州市思索数码科技有限公司 A kind of smart electronics lock management system and management method thereof
US9679152B1 (en) 2014-07-24 2017-06-13 Wells Fargo Bank, N.A. Augmented reality security access
ES2976646T3 (en) 2014-09-10 2024-08-06 Assa Abloy Ab First Entry Notification
CN104574593B (en) * 2014-12-24 2017-02-22 浙江银江研究院有限公司 Virtual key based on Bluetooth communication as well as anti-theft lock system and application method thereof
CN105809776A (en) * 2014-12-29 2016-07-27 唐蕙兰 Mobile phone dialing iris-recognition access control device
CN105894630A (en) * 2016-04-05 2016-08-24 顺德职业技术学院 Automobile access management system and entrance guard control method
US10068397B2 (en) * 2016-04-06 2018-09-04 Guardtime IP Holdings, Ltd. System and method for access control using context-based proof
CN106056730A (en) * 2016-08-09 2016-10-26 南京信息工程大学 Community garage intelligent access control system based on license plate detection and application method thereof
BR112019007529B1 (en) 2016-10-19 2023-12-05 Dormakaba Usa Inc. INTERCHANGEABLE LOCK FOR USE WITH A LOCK DEVICE
EP3679207B1 (en) 2017-09-08 2022-08-03 Dormakaba USA Inc. Electro-mechanical lock core
EP3553755B1 (en) * 2018-04-11 2021-05-26 Assa Abloy AB Method for providing access to a physical space
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
CN112752891B (en) 2018-04-13 2022-08-05 多玛卡巴美国公司 Electromechanical lock cylinder
JP2022175453A (en) * 2021-05-13 2022-11-25 キヤノン株式会社 Lock management system and read/write device
US11647392B1 (en) 2021-12-16 2023-05-09 Bank Of America Corporation Systems and methods for context-aware mobile application session protection

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2546842B2 (en) 1987-06-16 1996-10-23 日産自動車株式会社 Vehicle locking / unlocking control device
BR9106179A (en) * 1990-11-05 1993-03-16 Motorola Inc RF RADIO DATA SYSTEM AND COMMUNICATIONS, COMPUTER-CONTROLLED COMMUNICATIONS NETWORK, AND PROCESS TO INTERFACE A DATA COMMUNICATIONS SYSTEM
US5668876A (en) * 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
JP3535249B2 (en) * 1995-02-15 2004-06-07 東芝ソリューション株式会社 Unlocking / locking control system
US5736932A (en) * 1996-07-03 1998-04-07 At&T Corp Security for controlled access systems
US6720861B1 (en) * 1999-03-12 2004-04-13 Best Access Systems Wireless security control system
US6762684B1 (en) * 1999-04-19 2004-07-13 Accutrak Systems, Inc. Monitoring system
WO2001023694A1 (en) * 1999-09-27 2001-04-05 Tactel Ab Automatic locking system
CA2392405A1 (en) * 1999-11-30 2001-06-07 Bording Data A/S An electronic key device, a system and a method of managing electronic key information
JP2001222488A (en) * 2000-02-07 2001-08-17 Ricoh Co Ltd Remote output system
FR2810481B1 (en) * 2000-06-20 2003-04-04 Gemplus Card Int CONTROL OF ACCESS TO A DATA PROCESSING MEANS
EP1323323A1 (en) * 2000-08-15 2003-07-02 Telefonaktiebolaget LM Ericsson (publ) Network authentication by using a wap-enabled mobile phone
JP4789321B2 (en) * 2000-12-27 2011-10-12 キヤノン株式会社 Wireless communication system, access control apparatus, wireless communication apparatus, control method of wireless communication system, control method of access control apparatus, and control method of wireless communication apparatus
JP2002235469A (en) * 2001-02-08 2002-08-23 Casio Comput Co Ltd Lock control device, remote control system and program
SE521480C2 (en) * 2001-04-18 2003-11-04 Tagmaster Ab Procedure and device for access control and access control
TWI246028B (en) * 2001-06-28 2005-12-21 Trek 2000 Int Ltd A portable device having biometrics-based authentication capabilities
JP2003016520A (en) * 2001-06-29 2003-01-17 Yuniko:Kk Electronic lock system
US7113300B2 (en) * 2001-07-12 2006-09-26 Pitney Bowes Inc. Method and system for secure delivery and printing of documents
JP2003193723A (en) * 2001-12-27 2003-07-09 Citizen Watch Co Ltd Personal authentication system and id administration method
JP2003346241A (en) * 2002-05-27 2003-12-05 Micro Tooku Syst Kk Locker management system, locker management method and locker management program
CA2516704C (en) * 2003-02-21 2012-07-31 Ge Interlogix, Inc. Key control with real time communications to remote locations
JP4507166B2 (en) * 2003-11-26 2010-07-21 日本電気株式会社 Mobile terminal and security remote control system / security remote control method using the same

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103426215A (en) * 2012-05-21 2013-12-04 上海宽带技术及应用工程研究中心 Doorlock control method for rescue of accident and system
CN103426215B (en) * 2012-05-21 2015-12-16 上海宽带技术及应用工程研究中心 For door lock management-control method and the system of unexpected relief
CN104217477A (en) * 2014-08-06 2014-12-17 玺瑞股份有限公司 Bluetooth safety system
CN104217477B (en) * 2014-08-06 2016-08-10 玺瑞股份有限公司 Bluetooth security system
CN110084932A (en) * 2019-04-23 2019-08-02 上海救要救信息科技有限公司 A kind of rescue mode and equipment
CN110084932B (en) * 2019-04-23 2022-03-18 上海救要救信息科技有限公司 Rescue method and device

Also Published As

Publication number Publication date
SE0400425D0 (en) 2004-02-24
US20080211620A1 (en) 2008-09-04
WO2005080720A1 (en) 2005-09-01
CN100588814C (en) 2010-02-10
JP4524306B2 (en) 2010-08-18
SE525104C2 (en) 2004-11-30
SE0400425L (en) 2004-11-30
EP1718826A1 (en) 2006-11-08
JP2007523283A (en) 2007-08-16
US8466773B2 (en) 2013-06-18

Similar Documents

Publication Publication Date Title
CN1946912A (en) Method of authorization
US6850147B2 (en) Personal biometric key
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN105593911B (en) Access control method and access control system
EP2005635B1 (en) System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
US20080120707A1 (en) Systems and methods for authenticating a device by a centralized data server
JP2005508037A (en) Method and system for establishing identity trust
US20120002808A1 (en) Interleaving and deinterleaving method for preventing periodic position interference
US20090319428A1 (en) Authorizing An Electronic Payment Request
JP2002352166A (en) System and terminal for authenticating credit card
TWI725696B (en) Mobile device, verification terminal device and identity verification method
JP2009181561A (en) Security management system using biometric authentication
US20070043950A1 (en) Target apparatus, certification device, and certification method
CN100343881C (en) Access control system
US9705861B2 (en) Method of authorizing a person, an authorizing architecture and a computer program product
CN107077666A (en) Method and device for authorizing actions at a self-service system
JPWO2005062219A1 (en) Personal information storage device and portable terminal
EP2234423B1 (en) Secure identification over communication network
CN107070663B (en) Mobile terminal-based field authentication method and field authentication system
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
KR100872391B1 (en) Authentication method
KR101051552B1 (en) Door lock device and method using mobile communication terminal
WO2025042357A1 (en) A cyber security system for protecting vehicle control unit from cyber-attacks
JP2006079293A (en) Electronic business card certification method and system, and electronic business card certification device and terminal device
AU2018247338A1 (en) Authentication of the change of custody within the logistics supply chain.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: WILLGERT MIKAEL

Free format text: FORMER OWNER: TAGMASTER AB

Effective date: 20111104

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20111104

Address after: A Swedish spoon

Patentee after: Michel Wilgate

Address before: The country of Sweden

Patentee before: Tagmaster AB

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100210

CF01 Termination of patent right due to non-payment of annual fee